Categories: Cyber Security News

New FileFix Attack Exploits Windows File Explorer to Run Malicious Commands

Cybersecurity researcher Mr. D0x has developed FileFix, a novel social engineering attack that weaponizes Windows File Explorer’s address bar to execute malicious PowerShell commands.

This technique evolves the established ClickFix attack methodology by exploiting browser file-upload functionality to bypass traditional security warnings.

The attack chain begins when victims visit a phishing page disguised as a file-sharing notification (e.g., “HRPolicy.docx shared by mr.d0x”).

Technical Execution Mechanism

The attack leverages HTML’s <input type="file"> element to trigger File Explorer. When users click “Open File Explorer,” the page:

  1. Copies a malicious PowerShell command to the clipboard using navigator.clipboard.writeText()
  2. Opens File Explorer via the file-upload dialog
  3. Instructs users to paste the “file path” into the address bar (auto-highlighted via Ctrl+L)

The PowerShell command uses comment concatenation to hide malicious activity:

powershellPowershell.exe -c ping example.com # C:companyinternal-securefiledriveHRPolicy.docx

Here, ping example.com represents the malicious payload (e.g., malware download), while text after # displays a decoy path.

File Explorer executes the command before the comment, rendering the malicious portion invisible to victims.

Attack Innovations and Evasion Techniques

FileFix introduces critical advancements in social engineering:

  • MOTW (Mark of the Web) bypass: Executables run through File Explorer’s address bar shed MOTW warnings, enabling unsigned code execution
  • File upload blocking: JavaScript intercepts file-selection attempts, forcing victims to use the address bar:
javascriptfileInput.addEventListener('change', () => {
  alert("Please follow the stated instructions.");
  fileInput.value = "";
  setTimeout(() => fileInput.click(), 500);
});
  • Dual-path delivery: Variants combine command execution with automatic EXE downloads when the “Open File Explorer” button is clicked.

Enterprise Security Implications

This technique demonstrates heightened risk because:

  1. It exploits trusted UI elements (File Explorer) rather than suspicious terminals
  2. Commands originate from browser child processes (e.g., chrome.exe → cmd.exe), blending with legitimate activity
  3. The attack requires no malware downloads initially, bypassing endpoint detection

Security teams should monitor for unusual cmd.exe/powershell.exe spawns from browser processes and educate users about the risks associated with address-bar execution.

Researchers confirm FileFix’s effectiveness against current Windows 11 builds, highlighting the persistent threat posed by social engineering innovations.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post New FileFix Attack Exploits Windows File Explorer to Run Malicious Commands appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery…

2 hours ago

73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery…

2 hours ago

Litecoin Zero-Day Vulnerability Exploited in DoS Attack, Disrupts Major Mining Pools

A critical zero-day vulnerability in the Litecoin network was actively exploited to launch a denial-of-service…

2 hours ago

Maine’s Democratic Governor Vetoes Nation’s First State Moratorium on Data Centers

PORTLAND, Maine (AP) — Maine’s Democratic governor on Friday vetoed what would have been the…

5 hours ago

Maine’s Democratic Governor Vetoes Nation’s First State Moratorium on Data Centers

PORTLAND, Maine (AP) — Maine’s Democratic governor on Friday vetoed what would have been the…

5 hours ago

Trump uninjured after gunfire at Washington press dinner; suspect in custody

Federal agents draw their guns out after an incident at the annual White House Correspondents…

5 hours ago

This website uses cookies.